Episodes

Tuesday Dec 05, 2023
NCF-336 Confidential Computing Explained
Tuesday Dec 05, 2023
Tuesday Dec 05, 2023
Welcome back, everybody, to the New Cyber Frontier. In today's episode, guest Dave Singh, confidential computing business development manager at Intel, provides us with a deeper look into software runtime security. Often known as Confidential Computing, it "Implements hardware protections for the computation of sensitive data and ID while it is actively being processed on the server." (Mr. Singh) Explains how, in traditional execution, any other operation and process within the server has access to view the operations and extract the intellectual property or private operations of an executing process. With Confidential Computing, the process is run protected, so its operation is hidden even from the owner of the computer it is running on. Join in today and listen to some great explanations on how to protect your valuable intellectual property today.

Monday Nov 13, 2023
NCF-334 Security Engineering for Industrial Systems
Monday Nov 13, 2023
Monday Nov 13, 2023
Welcome back, everybody, to NewCyberFrontier. In today's episode, guest Andrew Ginter, Vice President of Industrial Security and Waterfall Security. Mr Ginter is also the author of a book titled, "Engineering Grade OT Security: A Managers Guide." He defines his book as sitting at the intersection of industrial systems and Engineering. These systems could range from inputs and outputs from computer systems such as power plants, Shoe factories, and high-speed passenger train rails. Mr. Ginter explains his book further by saying, "Small Shoe factories and High-speed train rail switches are very different on the Industrial system spectrum. What determines the difference is worst case consequences of compromise." What would be the worst outcome to a Shoe factory versus Passenger Train Rail switches if all commands to computer systems fail? Shoe factories might have to replace all the equipment and a couple million dollars worth of expenses that insurance could cover, but for the switches on a train, if all computer commands fail, this could result in massive casualties and two trains colliding, which insurance can not cover. These are two diverse examples of industrial systems that need to face different approaches to computer systems. Mr Ginter also explains in his book that Engineering Security is a public safety issue with no room for errors. "In recent years, we have been automating everything, which is not always the best option; we must have fail-safes in place with security and protection." We face many problems and cyber attacks in the engineering world that must be considered today. Thank you for watching NewCyberFrontier.

Tuesday Oct 03, 2023
NCF-333 EDGE Symposium Presentation
Tuesday Oct 03, 2023
Tuesday Oct 03, 2023
On today's episode of New Cyber Frontier, our host, Christopher Gorog, gives a special presentation on Blockframe at the Edge Symposium in Niskayuna, New York. Edge St, Bronx, NY 10465, " Amplifying profitable value from deployed IoT products," we learn to use Cybersecurity as a catalyst for profit. Gorog explains using a distributed trust to bring social and economic value to Blockframe customers, living up to the mission: "to enable customers to create resilient precision ecosystems for sustainable uniform consumption and production." Mr. Gorog describes this address as the day view of the last six years of his Ph.D. work, and we hope you enjoy it also. The talk explains how, in the chaotic industry that is Cybersecurity, businesses are in desperate need of holistic, modular, top-down security that spans across their entire ecosystem. The Blockframe approach implements simplicity. "We solve four significant issues: security for all segments of the Supply Chain, management of deployed devices and their safety, the integration of physical and digital Supply Chain, and lastly, the ability to scale." (Gorog). Blockframe has pioneered a way not to use mining, solving some of the major issues with blockchain and maintaining Carbon neutrality. Thank you for tuning in to this episode! If you have any questions or want to learn more about Blockframe, be sure to contact us on our website, newcyberfrontier.com

Monday Jul 24, 2023
NCF-332 Weaponized Documents and Content
Monday Jul 24, 2023
Monday Jul 24, 2023
Hello, Everybody, and welcome back to NewCyberFrontier. On today’s episode, we have guest Aviv Grafi, who is the CTO and founder of Votiro. Mr. Grafi talks about Weaponizing Documents and how they are getting more common and more dangerous, popping up in PDF files and Zip files. The best way to try to understand these attacks is to think like a hacker would think and try to protect yourself from future attacks by being vigilant of what you open. Learn more today on how you can protect yourself by tuning in to today’s episode.
Check our website NewCyberFrontier
Check out Votiro’s website
Visit our sponsors:

Monday Jun 19, 2023
NCF-330 High-risk is a Reality
Monday Jun 19, 2023
Monday Jun 19, 2023
On today's show, Samual Hill from Cyolo Security and Tim discuss High-Risk Access and the trends of corporations toward a more secure virtual ecosystem. With a background in the Emergency Room and an M.A. in Strategic Leadership, Samuel is passionate about helping organizations grow and protect themselves effectively in industries such as manufacturing, banking, financial services, insurance, and oil and gas. High Risk is still in today's headlines, and companies are starting to understand security. In this episode, we will discuss how that is trending in today's business culture, how security-related tools are or are not beneficial for remote working, and the manufacturing of oil and gas can benefit the most from security in these remote environments. With the idea of remote and the High Risk it brings to IT Systems of today, how can it benefit from understanding and having the experts evaluate security ramifications? Does security matter when using remote established work in a virtual ecosystem?
Visit our sponsors:

Tuesday Jun 13, 2023
NCF-329 API Marketplace and business opportunities
Tuesday Jun 13, 2023
Tuesday Jun 13, 2023
Welcome back to NewCyberFrontier. In this video, we have guest Patrick Clawson CEO of an API Security Platform Called Resurface Labs. Mr. Clawson has extensive knowledge of Cybersecurity with twenty-plus years of experience. In this episode, we will review API modules and how only 11% are in the marketplace, leaving a gap for encrypted security. We will also be addressing how to start up a business in the cybersecurity world. Starting up a business, Patrick Clawson comes in for growth and focuses on four successful initiatives. "Usually, I reach out to financial and Industrial analyses to get their view on the matter. The third thing I do is Intensive Competitive Research, getting everybody's verdicts worldwide, big or small. The last step is building out the pricing strategy and competitive advantages and contacting buyers to make it relevant. Tune in to today's episode. Thank you.

Monday Jun 05, 2023
NCF-328 How fast is the Cloud Migration Moving
Monday Jun 05, 2023
Monday Jun 05, 2023
On today's show, Fausto Lendeborg and Tim discuss Cloud Platforms, Cloud migration, the speed of business objectives, and the organization's perspective. Fausto is the Co-Founder and CEO of Secberus, a Cloud Security Governance Platform designed to manage cloud risk at scale. With over 20 years of experience in cybersecurity, Fausto has been an integral part of multiple successful ventures, including Prolexic and Zenedge; Fausto now focuses on sharing his cloud governance, Security, and compliance knowledge in the modern as-code environment. CISOs have a hold on the trending change and know how to use and secure cloud ecosystems for the organization's benefit. The idea of the Cloud has taken off and is now one of the top IT skills needed in today's business markets. So how is Security standing up and taking charge of the Cloud security and its virtual ecosystems?
Secberus Website
Secberus - Assess, understand and manage cloud infrastructure drift at enterprise scale.
Visit our sponsors:

Monday May 15, 2023
NCF-326 Cybersecurity Research
Monday May 15, 2023
Monday May 15, 2023
Welcome back to the show! Today we have guest Amit Serper Director of Security Research at Sternum. At Sternum, Mr. Serper is tasked with researching hardware or "Hardware Hacking," where he takes apart specific devices to gain access to them. Mr. Serpers say's, "Our approach to security at Sternum is, we know those devices are vulnerable for various reasons, but when developers write the code, we know they do not have security in mind. Our job is to understand the vulnerability that is on these devices." Security structures are not up to date on most devices, causing exploitation or vulnerability. Join in today's Episode of NewCyberFrontier.
Visit our sponsors:

Monday Apr 24, 2023
NCF-325 Security as a Business Value Proposition
Monday Apr 24, 2023
Monday Apr 24, 2023
Welcome back to the show! Our Guest, Justin Beals, CEO and co-founder at Strike Graph, a 20+ year veteran, Background in Telco, and four different startups. Today we talk about a new era of turning security tools into a business value proposition, turning the advertising of security posture into marketing goods and services. Tune into this week's podcast episode.
Visit our sponsors:

Monday Apr 17, 2023
NCF-324 Cybersecurity for Everyone
Monday Apr 17, 2023
Monday Apr 17, 2023
I hope everyone enjoyed the break! In today's episode, we have guest Scott Schober, President and CEO of Berkeley Varitronics Systems and a Cyber Expert who has published three books on Cybersecurity. Mr. Schober has had multiple altercations with getting hacked and has extensive knowledge of this matter, saying, "I call it the Digital footprint; the more you put out there about yourself, your whereabouts, your likes, it creates a digital profile about you which leaves a trail of breadcrumbs about you"(Schober.) One may think this is not a massive deal at the time, but as the information you leave behind becomes more extensive, this leads more of a target on your back to getting hacked or worse. You can control what you see on the internet and your phone, for example, "Say you look up or go buy a pregnancy test at the store; in the following weeks, you will see various ads and promos on your phone about subjects related to pregnancy tests, babies, etc." (Gorog.) This is an interesting and almost eerie subject to discuss because your phone can decide what you see based on your searches and interests. Go check out more on Scott Schober! Here is his website www.ScottSchober.com
Visit our sponsors: